Control Systems Cybersecurity Expert, Joseph M. Weiss, is an international authority on cybersecurity, control systems and system security. Weiss weighs in on cybersecurity, science and technology, security emerging threats and more.
Paul Rosenzweig wrote a blog on Lawfare (http://www.lawfareblog.com/2014/01/how-likely-is-a-successful-attack-on-the-electric-grid/) on “How Likely Is A Successful Attack On The Electric Grid?” Paul’s question of how likely is a successful attack on the electric grid has an easy, but uncomfortable answer - near 100%.
A presentation was made at the S4 Conference on wired HART vulnerabilities. Effectively the vulnerability allows the take over of a single field device, using the single field device to take over all of the other field devices on the HART highway, and/or to take over the asset management software.
Aurora was first publicly demonstrated at the Idaho National Laboratory (INL) in March 2007. DOD is responsible for assuring continuity of electric power at critical defense facilities. As such, DOD recognized the potential impacts from Aurora and initiated an Aurora hardware mitigation program.
I received the following Link-in request and thought it would be of interest as I believe it covers a broad swath of the utility infrastructure. “We met several years ago, I think back in 2002, when you spoke at a SCADA system users group meeting.
I believe way too many people and organizations particularly in the electric and water industries have a severe case of plausible deniability - “if I have not heard about it to my face, I do not have to address it.” However plausible deniability may have just sprung a leak.
According to Wikipedia, as of 2010 more than 90 million devices were installed with LonWorks technology. Manufacturers in a variety of industries have adopted the platform as the basis for their product and service offerings. As of December 23, 2013, the LonWorks Network Communication and Interface Guide is available on...
I attended the Amphion Conference December 12th in San Francisco. The Amphion Conference is focused on end-point devices, particularly mobile devices. Even though there were numerous sessions on the Internet of Things, there was very little attendance from the ICS community.
ENISA- the European Union Agency for Network and Information Security – issued a report on patching SCADA systems: “Window of exposure … a real problem for SCADA systems? Recommendations for Europe on SCADA patching” dated December 2013.
The October 2013 issue of IEEE Computer magazine has an article titles “Does security trump reliability?” The question of security vs reliability/safety is a critical one for industrial control systems (ICSs). For ICSs, security and reliability are NOT equals - reliability and safety MUST win or the system doesn’t work and...
Ironically, less than a week after the ICS Cyber Security Conference that NERC did not attend, NERC issued another set of Lessons Learned for three incidents. In each case, cyber communication issues resulted in system impacts.